7.4. Example: BASIC Authentication

In Section 7.2, I showed the external Web site for a fictional company named hot-dot-com.com. In this section, I’ll show their intranet. Since applications that use form-based authentication vary only slightly from those that use BASIC authentication, I’ll just concentrate on the differences here. I’ll start by showing the home page, then list the web.xml file, summarize the various protection mechanisms, show the password file, and give the code for each of the protected resources.

The Home Page

Listing 7.23 shows the top-level home page for the Web application. The application is registered with a URL prefix of /hotdotcom-internal so the home page can be accessed with the URL http://host/hotdotcom-internal/index.jsp as shown in Figure 7-15. If you’ve forgotten how to assign URL prefixes to Web applications, review Section 4.1 (Registering Web Applications).

Figure 7-15. Home page for the hot-dot-com.com intranet.


Now, the main home page has no security protections and consequently does not absolutely require an entry in web.xml. However, many users expect URLs that list a directory but no file to invoke the default file from that directory. So, I put a welcome-file-list entry in web.xml (see Listing 7.24 in the next section) to ensure that http://host/hotdotcom-internal/ invokes index.jsp.

Listing 7.23. index.jsp (Top-level home page)
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN"> 
<HTML> 
<HEAD> 
<TITLE>hot-dot-com.com!</TITLE> 
<LINK REL=STYLESHEET 
      HREF="company-styles.css" 
      TYPE="text/css"> 
</HEAD> 
<BODY> 
<TABLE BORDER=5 ALIGN="CENTER"> 
  <TR><TH CLASS="TITLE">hot-dot-com.com!</TABLE> 
<P> 
<H3>Welcome to the hot-dot-com intranet</H3> 
Please select one of the following: 
<UL> 
  <LI><A HREF="financial-plan.html">Financial Plan</A>. 
      Available to all employees. 
  <LI><A HREF="business-plan.html">Business Plan</A>. 
      Available only to corporate executives. 
  <LI><A HREF="employee-pay.jsp">Employee Compensation Plans</A>. 
      Available to all employees. 
</UL> 
</BODY> 
</HTML> 

The Deployment Descriptor

Listing 7.24 shows the complete deployment descriptor used with the hotdotcom-internal Web application. Again, remember that the order of the subelements within the web-app element of web.xml is not arbitrary—you must use the standard ordering. For details, see Section 5.2 (The Order of Elements within the Deployment Descriptor).

The deployment descriptor specifies several things:

  • URLs that give a directory but no filename result in the server first trying to use index.jsp and next trying index.html. If neither file is available, the result is server specific (e.g., a directory listing).

  • URLs that use the default servlet mapping (i.e., http://host/hotdotcom/servlet/ServletName) are redirected to the main home page.

  • The financial-plan.html page can be accessed only by company employees or executives.

  • The business-plan.html page can be accessed only by company executives.

Listing 7.24. WEB-INF/web.xml (Complete version for hot-dot-com.com intranet)
<?xml version="1.0" encoding="ISO-8859-1"?> 
<!DOCTYPE web-app PUBLIC 
    "-//Sun Microsystems, Inc.//DTD Web Application 2.2//EN" 
    "http://java.sun.com/j2ee/dtds/web-app_2_2.dtd"> 

<web-app> 
  <!-- A servlet that redirects users to the home page. --> 
  <servlet> 
    <servlet-name>Redirector</servlet-name> 
    <servlet-class>hotdotcom.RedirectorServlet</servlet-class> 
  </servlet> 

  <!-- Turn off invoker. Send requests to index.jsp. --> 
  <servlet-mapping> 
    <servlet-name>Redirector</servlet-name> 
    <url-pattern>/servlet/*</url-pattern> 
  </servlet-mapping> 

  <!-- If URL gives a directory but no filename, try index.jsp 
       first and index.html second. If neither is found, 
       the result is server specific (e.g., a directory 
       listing). --> 
  <welcome-file-list> 
    <welcome-file>index.jsp</welcome-file> 
    <welcome-file>index.html</welcome-file> 
  </welcome-file-list> 

  <!-- Protect financial plan. Employees or executives. --> 
  <security-constraint> 
    <web-resource-collection> 
      <web-resource-name>Financial Plan</web-resource-name> 
      <url-pattern>/financial-plan.html</url-pattern> 
    </web-resource-collection> 
    <auth-constraint> 
      <role-name>employee</role-name> 
      <role-name>executive</role-name> 
    </auth-constraint> 
  </security-constraint> 
  <!-- Protect business plan. Executives only. --> 
  <security-constraint> 
    <web-resource-collection> 
      <web-resource-name>Business Plan</web-resource-name> 
      <url-pattern>/business-plan.html</url-pattern> 
    </web-resource-collection> 
    <auth-constraint> 
      <role-name>executive</role-name> 
    </auth-constraint> 
  </security-constraint> 

  <!-- Tell the server to use BASIC authentication. --> 
  <login-config>
							<auth-method>BASIC</auth-method>
							<realm-name>Intranet</realm-name>
							</login-config> 
</web-app> 

The Password File

Password files are not specific to Web applications; they are general to the server. Listing 7.25 shows the password file used by Tomcat for this Web application. It defines three new users: gates and ellison in the employee role and mcnealy in the executive role.

Listing 7.25. install_dir/conf/tomcat-users.xml (Three new users)
<?xml version="1.0" encoding="ISO-8859-1"?> 
<tomcat-users> 
  <user name="john" password="nhoj" 
        roles="registered-user" /> 
  <user name="jane" password="enaj" 
        roles="registered-user" /> 
  <user name="juan" password="nauj" 
        roles="administrator" /> 
  <user name="juana" password="anauj" 
        roles="administrator,registered-user" /> 
  <user name="gates" password="llib"
							roles="employee" />
							<user name="ellison" password="yrral"
							roles="employee" />
							<user name="mcnealy" password="ttocs"
							roles="executive" /> 
</tomcat-users> 

The Financial Plan

Listing 7.26 shows the first of the protected pages at the hotdotcom-internal site. Figure 7-16 shows the dialog box presented by Netscape to unauthenticated users who attempt to access the page. Figures 7-17 and 7-18 show unsuccessful and successful login attempts, respectively.

Figure 7-16. Unauthenticated users who attempt to access protected resources are presented with a dialog box.


Figure 7-17. A failed login attempt.


Figure 7-18. A successful login attempt.


Listing 7.26. financial-plan.html
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN"> 
<HTML> 
<HEAD> 
<TITLE>Financial Plan</TITLE> 
<LINK REL=STYLESHEET 
      HREF="company-styles.css" 
      TYPE="text/css"> 
</HEAD> 
<BODY> 
<TABLE BORDER=5 ALIGN="CENTER"> 
  <TR><TH CLASS="TITLE">Financial Plan</TABLE> 
<P> 
<H3>Steps:</H3> 
<OL> 
  <LI>Make lots of money. 
  <LI>Increase value of stock options. 
  <LI>Make more money. 
  <LI>Increase stock option value further. 
</OL> 
</BODY> 
</HTML> 

The Business Plan

The financial plan of the previous section is available to all employees and executives. The business plan (Listing 7.27), in contrast, is available only to executives. Thus, it is possible for an authenticated user to be denied access to it. Figure 7-19 shows this result. OK, so you have access to more than one username/password combination. You were authenticated as a user with restricted privileges. You now want to log in as a user with additional privileges. How do you do so? Unfortunately, the answer is: quit the browser and restart. Boo. That’s one of the downsides of BASIC authentication.

Figure 7-19. Attempt to access the business plan by an authenticated user who is not in the executive role. This result is different from that of failed authentication, which is shown in Figure 7-17.


Figure 7-20 shows the result after the browser is restarted and the client logs in as a user in the executive role (mcnealy in this case).

Figure 7-20. Attempt to access the business plan by an authenticated user who is in the executive role.


Listing 7.27. business-plan.html
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN"> 
<HTML> 
<HEAD> 
<TITLE>Business Plan</TITLE> 
<LINK REL=STYLESHEET 
      HREF="company-styles.css" 
      TYPE="text/css"> 
</HEAD> 
<BODY> 
<TABLE BORDER=5 ALIGN="CENTER"> 
  <TR><TH CLASS="TITLE">Business Plan</TABLE> 
<P> 
<H3>Steps:</H3> 
<OL> 
  <LI>Inflate name recognition by buying meaningless ads 
      on high-profile TV shows. 
  <LI>Decrease employee pay by promising stock options instead. 
  <LI>Increase executive pay with lots of perks and bonuses. 
  <LI>Get bought out before anyone notices we have no 
      business plan. 
</OL> 
</BODY> 
</HTML> 

The Redirector Servlet

As it currently stands, the hotdotcom-internal application has no protected servlets. So, it is not absolutely necessary to disable the invoker servlet and redirect requests that are sent to http://host/hotdotcom-internal/servlet/something. However, it is a good idea to plan ahead and disable the invoker servlet as a matter of course in all Web applications that have restricted resources.

This application uses the same redirector servlet (Listing 7.19) and url-pattern entry in web.xml (Listing 7.24) as does the external hotdotcom application.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.144.123.155